{"id":"https://openalex.org/W4211083466","doi":"https://doi.org/10.1109/ccnc49033.2022.9700583","title":"Ohana Means Family: Malware Family Classification using Extreme Learning Machines","display_name":"Ohana Means Family: Malware Family Classification using Extreme Learning Machines","publication_year":2022,"publication_date":"2022-01-08","ids":{"openalex":"https://openalex.org/W4211083466","doi":"https://doi.org/10.1109/ccnc49033.2022.9700583"},"language":"en","primary_location":{"id":"doi:10.1109/ccnc49033.2022.9700583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc49033.2022.9700583","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 19th Annual Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064028585","display_name":"Aaron Walker","orcid":"https://orcid.org/0000-0003-4040-6665"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Aaron Walker","raw_affiliation_strings":["University of Nevada,Department of Computer Science and Engineering,Reno,USA","Department of Computer Science and Engineering, University of Nevada, Reno, USA"],"affiliations":[{"raw_affiliation_string":"University of Nevada,Department of Computer Science and Engineering,Reno,USA","institution_ids":["https://openalex.org/I134113660"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nevada, Reno, USA","institution_ids":["https://openalex.org/I134113660"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039235730","display_name":"Raj Mani Shukla","orcid":"https://orcid.org/0000-0002-8239-7325"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Raj Mani Shukla","raw_affiliation_strings":["University of Bristol,Department of Computer Science,UK","Department of Computer Science, University of Bristol, UK"],"affiliations":[{"raw_affiliation_string":"University of Bristol,Department of Computer Science,UK","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"Department of Computer Science, University of Bristol, UK","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008136058","display_name":"Tapadhir Das","orcid":"https://orcid.org/0000-0002-4793-8982"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tapadhir Das","raw_affiliation_strings":["University of Nevada,Department of Computer Science and Engineering,Reno,USA","Department of Computer Science and Engineering, University of Nevada, Reno, USA"],"affiliations":[{"raw_affiliation_string":"University of Nevada,Department of Computer Science and Engineering,Reno,USA","institution_ids":["https://openalex.org/I134113660"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nevada, Reno, USA","institution_ids":["https://openalex.org/I134113660"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100748436","display_name":"Shamik Sengupta","orcid":"https://orcid.org/0000-0002-2019-8056"},"institutions":[{"id":"https://openalex.org/I134113660","display_name":"University of Nevada, Reno","ror":"https://ror.org/01keh0577","country_code":"US","type":"education","lineage":["https://openalex.org/I134113660"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shamik Sengupta","raw_affiliation_strings":["University of Nevada,Department of Computer Science and Engineering,Reno,USA","Department of Computer Science and Engineering, University of Nevada, Reno, USA"],"affiliations":[{"raw_affiliation_string":"University of Nevada,Department of Computer Science and Engineering,Reno,USA","institution_ids":["https://openalex.org/I134113660"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, University of Nevada, Reno, USA","institution_ids":["https://openalex.org/I134113660"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5064028585"],"corresponding_institution_ids":["https://openalex.org/I134113660"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01572691,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"534","last_page":"542"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12676","display_name":"Machine Learning and ELM","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.9628132581710815},{"id":"https://openalex.org/keywords/extreme-learning-machine","display_name":"Extreme learning machine","score":0.8284355401992798},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.805650532245636},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.6441715359687805},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5861138701438904},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5861127376556396},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.46202123165130615},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34080052375793457},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32055747509002686},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.21167880296707153},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07296103239059448}],"concepts":[{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.9628132581710815},{"id":"https://openalex.org/C2780150128","wikidata":"https://www.wikidata.org/wiki/Q21948731","display_name":"Extreme learning machine","level":3,"score":0.8284355401992798},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.805650532245636},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.6441715359687805},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5861138701438904},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5861127376556396},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.46202123165130615},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34080052375793457},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32055747509002686},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.21167880296707153},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07296103239059448},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccnc49033.2022.9700583","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccnc49033.2022.9700583","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 19th Annual Consumer Communications &amp; Networking Conference (CCNC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1780149461","https://openalex.org/W2026131661","https://openalex.org/W2111072639","https://openalex.org/W2158054309","https://openalex.org/W2632775315","https://openalex.org/W2735629075","https://openalex.org/W2769430664","https://openalex.org/W2810114801","https://openalex.org/W2892035503","https://openalex.org/W2894950245","https://openalex.org/W2912135847","https://openalex.org/W2921118464","https://openalex.org/W2938888905","https://openalex.org/W2950005521","https://openalex.org/W2952311595","https://openalex.org/W2959221393","https://openalex.org/W2964053523","https://openalex.org/W2967107104","https://openalex.org/W2986820410","https://openalex.org/W3005422799","https://openalex.org/W3006727660","https://openalex.org/W3010654368","https://openalex.org/W3017269319","https://openalex.org/W3036491774","https://openalex.org/W3112012065","https://openalex.org/W6746258567"],"related_works":["https://openalex.org/W2067443264","https://openalex.org/W31566076","https://openalex.org/W2097492617","https://openalex.org/W4297902562","https://openalex.org/W2741186499","https://openalex.org/W2804652951","https://openalex.org/W2968645206","https://openalex.org/W2753240997","https://openalex.org/W2160606508","https://openalex.org/W2969890106"],"abstract_inverted_index":{"Malwares":[0],"have":[1,16],"historically":[2],"been":[3],"the":[4,10,22,95,116,142,164,178,186],"central":[5],"threat":[6],"concerning":[7],"cybersecurity.":[8],"With":[9],"rise":[11],"in":[12,222,233],"modern":[13,34],"technologies,":[14],"malwares":[15],"become":[17],"more":[18],"lethal":[19],"due":[20],"to":[21,40,94,124,224],"increasing":[23,32],"connectivity":[24],"between":[25,76],"various":[26],"computing":[27,110],"environments.":[28,111],"To":[29,112],"exacerbate":[30],"this":[31,114],"threat,":[33,115],"day":[35],"anti-virus":[36],"signature":[37,88],"matching":[38],"seems":[39],"provide":[41],"limited":[42],"effectiveness,":[43],"which":[44],"makes":[45],"it":[46],"possible":[47],"that":[48,185],"new":[49,79,103],"malware":[50,64,80,104,121,128,131,171,194],"variants":[51,105],"can":[52,106,189],"evade":[53],"detection":[54,122],"when":[55,77,101],"their":[56],"behavior":[57],"does":[58],"not":[59],"correlate":[60],"exactly":[61],"with":[62,196,212],"known":[63],"signatures":[65],"on":[66,109],"a":[67,72,78,119,175],"system.":[68],"There":[69],"is":[70,82,89,100,135,230],"also":[71],"wide":[73],"time":[74,98,138,221,237],"gap":[75,99],"variant":[81],"released,":[83],"and":[84,91,126,129,153,169,192,199,209,238],"its":[85],"corresponding":[86],"antivirus":[87],"developed":[90],"made":[92],"available":[93],"public.":[96],"This":[97,134],"these":[102],"cause":[107],"havoc":[108],"counteract":[113],"paper":[117,161],"proposes":[118],"novel":[120],"methodology":[123],"analyze":[125],"detect":[127,191],"classify":[130,193],"by":[132,166],"family.":[133],"performed":[136],"through":[137],"series":[139],"analysis":[140],"of":[141,144,177,219,235],"sequence":[143],"API":[145,179],"calls":[146],"made,":[147],"using":[148,174],"Extreme":[149,156],"Learning":[150,157],"Machines":[151,158],"(ELM)":[152],"Online":[154],"Sequential":[155],"(OS-ELM).":[159],"The":[160],"further":[162],"analyzes":[163],"approach":[165,188],"accurately":[167,190],"detecting":[168],"predicting":[170],"family":[172],"classification":[173],"subset":[176],"call":[180],"sequences.":[181],"Simulation":[182],"results":[183],"show":[184,207],"proposed":[187],"families":[195],"higher":[197],"accuracy":[198,214],"greater":[200],"speed":[201],"than":[202],"traditional":[203],"LSTM.":[204],"Our":[205],"experiments":[206],"ELM":[208],"OS-ELM":[210],"performing":[211],"91%":[213],"within":[215],"just":[216],"3":[217],"seconds":[218],"learning":[220],"contrast":[223],"other":[225],"methods.":[226],"Thus,":[227],"our":[228],"method":[229],"superior":[231],"both":[232],"terms":[234],"training":[236],"accuracy.":[239]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
